1 00:00:01,610 --> 00:00:09,410 So the wireless security protocols are weap, WPA and WPA to. 2 00:00:10,240 --> 00:00:17,050 Now, of course, they probably on some level serve the same purpose, but they're certainly different 3 00:00:17,050 --> 00:00:18,090 all at the same time. 4 00:00:18,760 --> 00:00:24,580 So not only do wireless security protocols prevent unwanted parties from connecting to your wireless 5 00:00:24,580 --> 00:00:29,440 network, but also encrypt your private data sent over the airwaves. 6 00:00:31,690 --> 00:00:41,200 So wired equivalent privacy or weap, that is the ATO 211 standard that was introduced to provide privacy 7 00:00:41,200 --> 00:00:44,230 features similar to those found in wired networks. 8 00:00:45,500 --> 00:00:53,030 Then as soon as floors in weap were discovered, I trivially created a new group called Aido to 11, 9 00:00:53,030 --> 00:00:56,120 I aimed at improving Wi-Fi security and then. 10 00:00:57,100 --> 00:01:03,820 WPA or Wi-Fi protected access replaced WSP in 2003. 11 00:01:04,980 --> 00:01:09,390 Then followed swiftly on the heels by two or. 12 00:01:10,470 --> 00:01:14,340 Another eight to 11 is standard in 2004. 13 00:01:16,280 --> 00:01:21,290 So WEAP was designed to provide the same level of security as that of wired land. 14 00:01:22,550 --> 00:01:29,120 Because wireless networks broadcast messages using radio signals they are susceptible to eavesdropping. 15 00:01:30,440 --> 00:01:37,340 Wet provide security by encrypting data over radio waves so that it's protected as it's transmitted 16 00:01:37,730 --> 00:01:39,350 from one end point to another. 17 00:01:41,520 --> 00:01:49,860 WEAP uses the stream cypher RC four for confidentiality, CCRC 32 checks for integrity. 18 00:01:51,320 --> 00:01:56,990 So now there are two methods of authentication that can be used with Web open system authentication 19 00:01:56,990 --> 00:02:00,650 and shared key authentication, which I briefly mentioned earlier. 20 00:02:02,580 --> 00:02:10,620 If privacy is of primary concern, it's more advisable to use open system authentication for Web authentication 21 00:02:11,160 --> 00:02:13,410 rather than shared key authentication. 22 00:02:14,380 --> 00:02:19,600 However, it also means that any wireless LAN client can connect to the app. 23 00:02:21,320 --> 00:02:28,070 So basically, both authentication mechanisms are kind of weak, right, shared key web is deprecated 24 00:02:28,070 --> 00:02:31,430 in favor of WPA and WPA to. 25 00:02:33,460 --> 00:02:39,460 So then the recommended solution to Web security problems now switch to to. 26 00:02:40,980 --> 00:02:48,720 WPA was an intermediate solution for hardware that couldn't really support WPA, too. 27 00:02:48,750 --> 00:02:49,980 Yet we still talk about it. 28 00:02:51,080 --> 00:03:00,200 But WPA uses a message integrity check algorithm, it's called Technip, and it verifies the integrity 29 00:03:00,200 --> 00:03:06,470 of the packets, it prevents an attacker from altering and then resending data packets. 30 00:03:07,760 --> 00:03:17,960 Webb used an unchanged 64 or 128 bit encryption key that must be manually entered into wireless access 31 00:03:17,960 --> 00:03:19,100 points and devices. 32 00:03:20,760 --> 00:03:30,300 Technip uses one key per packet, which dynamically creates a new 128 bit key for each packet. 33 00:03:30,570 --> 00:03:31,800 I mean, that's insane, right? 34 00:03:32,750 --> 00:03:35,420 But definitely prevents Web attacks. 35 00:03:36,970 --> 00:03:45,730 So after a security flaw appeared in WPA, WPA two with a stronger encryption algorithm was released 36 00:03:45,730 --> 00:03:47,650 to replace WPA. 37 00:03:48,630 --> 00:03:56,070 So that's why we still talk about WPA, but really we're talking about the WPA to now you get it.